Intelligence and security informatics: Pacific Asia workshop, PAISI 2011, Beijing, China, July 9, 2011 ; proceedings
Gespeichert in:
Format: | Elektronisch Tagungsbericht E-Book |
---|---|
Sprache: | English |
Veröffentlicht: |
Berlin [u.a.]
Springer
2011
|
Schriftenreihe: | Lecture notes in computer science
6749 |
Schlagworte: | |
Online-Zugang: | Volltext |
Beschreibung: | 1 Online-Ressource (X, 129 S.) graph. Darst., Kt. |
ISBN: | 9783642220388 9783642220395 |
DOI: | 10.1007/978-3-642-22039-5 |
Internformat
MARC
LEADER | 00000nam a2200000 cb4500 | ||
---|---|---|---|
001 | BV039544368 | ||
003 | DE-604 | ||
005 | 20120820 | ||
007 | cr|uuu---uuuuu | ||
008 | 110824s2011 xx bd|| o|||| 10||| eng d | ||
020 | |a 9783642220388 |c kart. : ca. EUR 49.22 (DE) (freier Pr.), ca. sfr 66.00 (freier Pr.) |9 978-3-642-22038-8 | ||
020 | |a 9783642220395 |c Online |9 978-3-642-22039-5 | ||
024 | 7 | |a 10.1007/978-3-642-22039-5 |2 doi | |
035 | |a (OCoLC)745501355 | ||
035 | |a (DE-599)BVBBV039544368 | ||
040 | |a DE-604 |b ger |e rakddb | ||
041 | 0 | |a eng | |
049 | |a DE-473 |a DE-19 |a DE-91 |a DE-706 |a DE-739 |a DE-384 |a DE-M347 |a DE-20 |a DE-703 |a DE-355 |a DE-92 |a DE-Aug4 |a DE-859 |a DE-634 | ||
082 | 0 | |a 005.8 |2 22//ger | |
084 | |a DAT 055f |2 stub | ||
084 | |a DAT 460f |2 stub | ||
084 | |a DAT 000 |2 stub | ||
084 | |a MED 730f |2 stub | ||
245 | 1 | 0 | |a Intelligence and security informatics |b Pacific Asia workshop, PAISI 2011, Beijing, China, July 9, 2011 ; proceedings |c Michael Chau ... (eds.) |
264 | 1 | |a Berlin [u.a.] |b Springer |c 2011 | |
300 | |a 1 Online-Ressource (X, 129 S.) |b graph. Darst., Kt. | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
490 | 1 | |a Lecture notes in computer science |v 6749 | |
650 | 0 | 7 | |a Schutz |0 (DE-588)4180271-8 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Objektverfolgung |0 (DE-588)4311226-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Data Mining |0 (DE-588)4428654-5 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Kryptoanalyse |0 (DE-588)4830502-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Internetkriminalität |0 (DE-588)7864395-8 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Kryptologie |0 (DE-588)4033329-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Computerkriminalität |0 (DE-588)4010452-7 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Maschinelles Sehen |0 (DE-588)4129594-8 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Datensicherung |0 (DE-588)4011144-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Authentifikation |0 (DE-588)4330656-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Zugriffskontrolle |0 (DE-588)4293034-0 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a World Wide Web 2.0 |0 (DE-588)7548364-6 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Privatsphäre |0 (DE-588)4123980-5 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Internet |0 (DE-588)4308416-3 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Innere Sicherheit |0 (DE-588)4127888-4 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Social Media |0 (DE-588)4639271-3 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Wissensextraktion |0 (DE-588)4546354-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Kamera |0 (DE-588)4366655-3 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Soziales Netzwerk |0 (DE-588)4055762-5 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Kritische Informationsinfrastruktur |0 (DE-588)7636254-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Soft Computing |0 (DE-588)4455833-8 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Content Management |0 (DE-588)4673954-3 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Automatische Identifikation |0 (DE-588)4206098-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Bilderkennung |0 (DE-588)4264283-8 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Computerforensik |0 (DE-588)4774034-6 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Terrorismus |0 (DE-588)4059534-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Text Mining |0 (DE-588)4728093-1 |2 gnd |9 rswk-swf |
653 | |a Paperback / softback | ||
653 | |a Research | ||
653 | |a Web usage mining | ||
653 | |a crime ontology | ||
653 | |a geospatial analysis | ||
653 | |a modeling and simulation | ||
653 | |a public health security | ||
655 | 7 | |0 (DE-588)1071861417 |a Konferenzschrift |y 2011 |z Peking |2 gnd-content | |
689 | 0 | 0 | |a Internetkriminalität |0 (DE-588)7864395-8 |D s |
689 | 0 | 1 | |a Kryptoanalyse |0 (DE-588)4830502-9 |D s |
689 | 0 | 2 | |a Datensicherung |0 (DE-588)4011144-1 |D s |
689 | 0 | 3 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 0 | |5 DE-604 | |
689 | 1 | 0 | |a Computerkriminalität |0 (DE-588)4010452-7 |D s |
689 | 1 | 1 | |a World Wide Web 2.0 |0 (DE-588)7548364-6 |D s |
689 | 1 | 2 | |a Data Mining |0 (DE-588)4428654-5 |D s |
689 | 1 | 3 | |a Text Mining |0 (DE-588)4728093-1 |D s |
689 | 1 | 4 | |a Kryptologie |0 (DE-588)4033329-2 |D s |
689 | 1 | 5 | |a Datensicherung |0 (DE-588)4011144-1 |D s |
689 | 1 | 6 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 1 | |8 1\p |5 DE-604 | |
689 | 2 | 0 | |a Internet |0 (DE-588)4308416-3 |D s |
689 | 2 | 1 | |a Soziales Netzwerk |0 (DE-588)4055762-5 |D s |
689 | 2 | 2 | |a Social Media |0 (DE-588)4639271-3 |D s |
689 | 2 | 3 | |a Wissensextraktion |0 (DE-588)4546354-2 |D s |
689 | 2 | 4 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 2 | 5 | |a Datensicherung |0 (DE-588)4011144-1 |D s |
689 | 2 | |8 2\p |5 DE-604 | |
689 | 3 | 0 | |a Computerkriminalität |0 (DE-588)4010452-7 |D s |
689 | 3 | 1 | |a Computerforensik |0 (DE-588)4774034-6 |D s |
689 | 3 | 2 | |a Data Mining |0 (DE-588)4428654-5 |D s |
689 | 3 | 3 | |a Wissensextraktion |0 (DE-588)4546354-2 |D s |
689 | 3 | 4 | |a Kryptoanalyse |0 (DE-588)4830502-9 |D s |
689 | 3 | 5 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 3 | |8 3\p |5 DE-604 | |
689 | 4 | 0 | |a Kritische Informationsinfrastruktur |0 (DE-588)7636254-1 |D s |
689 | 4 | 1 | |a Schutz |0 (DE-588)4180271-8 |D s |
689 | 4 | 2 | |a Privatsphäre |0 (DE-588)4123980-5 |D s |
689 | 4 | 3 | |a Zugriffskontrolle |0 (DE-588)4293034-0 |D s |
689 | 4 | 4 | |a Authentifikation |0 (DE-588)4330656-1 |D s |
689 | 4 | |8 4\p |5 DE-604 | |
689 | 5 | 0 | |a Maschinelles Sehen |0 (DE-588)4129594-8 |D s |
689 | 5 | 1 | |a Bilderkennung |0 (DE-588)4264283-8 |D s |
689 | 5 | 2 | |a Automatische Identifikation |0 (DE-588)4206098-9 |D s |
689 | 5 | 3 | |a Objektverfolgung |0 (DE-588)4311226-2 |D s |
689 | 5 | 4 | |a Kamera |0 (DE-588)4366655-3 |D s |
689 | 5 | |8 5\p |5 DE-604 | |
689 | 6 | 0 | |a Internet |0 (DE-588)4308416-3 |D s |
689 | 6 | 1 | |a Terrorismus |0 (DE-588)4059534-1 |D s |
689 | 6 | 2 | |a Content Management |0 (DE-588)4673954-3 |D s |
689 | 6 | 3 | |a Data Mining |0 (DE-588)4428654-5 |D s |
689 | 6 | 4 | |a Innere Sicherheit |0 (DE-588)4127888-4 |D s |
689 | 6 | |8 6\p |5 DE-604 | |
689 | 7 | 0 | |a Soft Computing |0 (DE-588)4455833-8 |D s |
689 | 7 | |8 7\p |5 DE-604 | |
700 | 1 | |a Chau, Michael |e Sonstige |0 (DE-588)138455058 |4 oth | |
711 | 2 | |a PAISI |d 2011 |c Peking |j Sonstige |0 (DE-588)16163608-1 |4 oth | |
830 | 0 | |a Lecture notes in computer science |v 6749 |w (DE-604)BV014880109 |9 6749 | |
856 | 4 | 0 | |u https://doi.org/10.1007/978-3-642-22039-5 |x Verlag |3 Volltext |
883 | 1 | |8 1\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk | |
883 | 1 | |8 2\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk | |
883 | 1 | |8 3\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk | |
883 | 1 | |8 4\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk | |
883 | 1 | |8 5\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk | |
883 | 1 | |8 6\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk | |
883 | 1 | |8 7\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk | |
912 | |a ZDB-2-LNC | ||
912 | |a ZDB-2-SCS | ||
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-024396384 |
Datensatz im Suchindex
_version_ | 1820875338285056000 |
---|---|
adam_text | |
any_adam_object | |
author_GND | (DE-588)138455058 |
building | Verbundindex |
bvnumber | BV039544368 |
classification_rvk | SS 4800 |
classification_tum | DAT 055f DAT 460f DAT 000 MED 730f |
collection | ZDB-2-LNC ZDB-2-SCS |
ctrlnum | (OCoLC)745501355 (DE-599)BVBBV039544368 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik Medizin |
doi_str_mv | 10.1007/978-3-642-22039-5 |
format | Electronic Conference Proceeding eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>00000nam a2200000 cb4500</leader><controlfield tag="001">BV039544368</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20120820</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">110824s2011 xx bd|| o|||| 10||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783642220388</subfield><subfield code="c">kart. : ca. EUR 49.22 (DE) (freier Pr.), ca. sfr 66.00 (freier Pr.)</subfield><subfield code="9">978-3-642-22038-8</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783642220395</subfield><subfield code="c">Online</subfield><subfield code="9">978-3-642-22039-5</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1007/978-3-642-22039-5</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)745501355</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV039544368</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rakddb</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-473</subfield><subfield code="a">DE-19</subfield><subfield code="a">DE-91</subfield><subfield code="a">DE-706</subfield><subfield code="a">DE-739</subfield><subfield code="a">DE-384</subfield><subfield code="a">DE-M347</subfield><subfield code="a">DE-20</subfield><subfield code="a">DE-703</subfield><subfield code="a">DE-355</subfield><subfield code="a">DE-92</subfield><subfield code="a">DE-Aug4</subfield><subfield code="a">DE-859</subfield><subfield code="a">DE-634</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">22//ger</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 055f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 460f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 000</subfield><subfield code="2">stub</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">MED 730f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Intelligence and security informatics</subfield><subfield code="b">Pacific Asia workshop, PAISI 2011, Beijing, China, July 9, 2011 ; proceedings</subfield><subfield code="c">Michael Chau ... (eds.)</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Berlin [u.a.]</subfield><subfield code="b">Springer</subfield><subfield code="c">2011</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (X, 129 S.)</subfield><subfield code="b">graph. Darst., Kt.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Lecture notes in computer science</subfield><subfield code="v">6749</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Schutz</subfield><subfield code="0">(DE-588)4180271-8</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Objektverfolgung</subfield><subfield code="0">(DE-588)4311226-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Data Mining</subfield><subfield code="0">(DE-588)4428654-5</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptoanalyse</subfield><subfield code="0">(DE-588)4830502-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Internetkriminalität</subfield><subfield code="0">(DE-588)7864395-8</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptologie</subfield><subfield code="0">(DE-588)4033329-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computerkriminalität</subfield><subfield code="0">(DE-588)4010452-7</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Maschinelles Sehen</subfield><subfield code="0">(DE-588)4129594-8</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Authentifikation</subfield><subfield code="0">(DE-588)4330656-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Zugriffskontrolle</subfield><subfield code="0">(DE-588)4293034-0</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">World Wide Web 2.0</subfield><subfield code="0">(DE-588)7548364-6</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Privatsphäre</subfield><subfield code="0">(DE-588)4123980-5</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Internet</subfield><subfield code="0">(DE-588)4308416-3</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Innere Sicherheit</subfield><subfield code="0">(DE-588)4127888-4</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Social Media</subfield><subfield code="0">(DE-588)4639271-3</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Wissensextraktion</subfield><subfield code="0">(DE-588)4546354-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kamera</subfield><subfield code="0">(DE-588)4366655-3</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Soziales Netzwerk</subfield><subfield code="0">(DE-588)4055762-5</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kritische Informationsinfrastruktur</subfield><subfield code="0">(DE-588)7636254-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Soft Computing</subfield><subfield code="0">(DE-588)4455833-8</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Content Management</subfield><subfield code="0">(DE-588)4673954-3</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Automatische Identifikation</subfield><subfield code="0">(DE-588)4206098-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Bilderkennung</subfield><subfield code="0">(DE-588)4264283-8</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computerforensik</subfield><subfield code="0">(DE-588)4774034-6</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Terrorismus</subfield><subfield code="0">(DE-588)4059534-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Text Mining</subfield><subfield code="0">(DE-588)4728093-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Paperback / softback</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Research</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Web usage mining</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">crime ontology</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">geospatial analysis</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">modeling and simulation</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">public health security</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)1071861417</subfield><subfield code="a">Konferenzschrift</subfield><subfield code="y">2011</subfield><subfield code="z">Peking</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Internetkriminalität</subfield><subfield code="0">(DE-588)7864395-8</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Kryptoanalyse</subfield><subfield code="0">(DE-588)4830502-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="3"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="1" ind2="0"><subfield code="a">Computerkriminalität</subfield><subfield code="0">(DE-588)4010452-7</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="1"><subfield code="a">World Wide Web 2.0</subfield><subfield code="0">(DE-588)7548364-6</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="2"><subfield code="a">Data Mining</subfield><subfield code="0">(DE-588)4428654-5</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="3"><subfield code="a">Text Mining</subfield><subfield code="0">(DE-588)4728093-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="4"><subfield code="a">Kryptologie</subfield><subfield code="0">(DE-588)4033329-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="5"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="6"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2=" "><subfield code="8">1\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="2" ind2="0"><subfield code="a">Internet</subfield><subfield code="0">(DE-588)4308416-3</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="2" ind2="1"><subfield code="a">Soziales Netzwerk</subfield><subfield code="0">(DE-588)4055762-5</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="2" ind2="2"><subfield code="a">Social Media</subfield><subfield code="0">(DE-588)4639271-3</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="2" ind2="3"><subfield code="a">Wissensextraktion</subfield><subfield code="0">(DE-588)4546354-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="2" ind2="4"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="2" ind2="5"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="2" ind2=" "><subfield code="8">2\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="3" ind2="0"><subfield code="a">Computerkriminalität</subfield><subfield code="0">(DE-588)4010452-7</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="3" ind2="1"><subfield code="a">Computerforensik</subfield><subfield code="0">(DE-588)4774034-6</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="3" ind2="2"><subfield code="a">Data Mining</subfield><subfield code="0">(DE-588)4428654-5</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="3" ind2="3"><subfield code="a">Wissensextraktion</subfield><subfield code="0">(DE-588)4546354-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="3" ind2="4"><subfield code="a">Kryptoanalyse</subfield><subfield code="0">(DE-588)4830502-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="3" ind2="5"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="3" ind2=" "><subfield code="8">3\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="4" ind2="0"><subfield code="a">Kritische Informationsinfrastruktur</subfield><subfield code="0">(DE-588)7636254-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="4" ind2="1"><subfield code="a">Schutz</subfield><subfield code="0">(DE-588)4180271-8</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="4" ind2="2"><subfield code="a">Privatsphäre</subfield><subfield code="0">(DE-588)4123980-5</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="4" ind2="3"><subfield code="a">Zugriffskontrolle</subfield><subfield code="0">(DE-588)4293034-0</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="4" ind2="4"><subfield code="a">Authentifikation</subfield><subfield code="0">(DE-588)4330656-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="4" ind2=" "><subfield code="8">4\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="5" ind2="0"><subfield code="a">Maschinelles Sehen</subfield><subfield code="0">(DE-588)4129594-8</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="5" ind2="1"><subfield code="a">Bilderkennung</subfield><subfield code="0">(DE-588)4264283-8</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="5" ind2="2"><subfield code="a">Automatische Identifikation</subfield><subfield code="0">(DE-588)4206098-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="5" ind2="3"><subfield code="a">Objektverfolgung</subfield><subfield code="0">(DE-588)4311226-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="5" ind2="4"><subfield code="a">Kamera</subfield><subfield code="0">(DE-588)4366655-3</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="5" ind2=" "><subfield code="8">5\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="6" ind2="0"><subfield code="a">Internet</subfield><subfield code="0">(DE-588)4308416-3</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="6" ind2="1"><subfield code="a">Terrorismus</subfield><subfield code="0">(DE-588)4059534-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="6" ind2="2"><subfield code="a">Content Management</subfield><subfield code="0">(DE-588)4673954-3</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="6" ind2="3"><subfield code="a">Data Mining</subfield><subfield code="0">(DE-588)4428654-5</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="6" ind2="4"><subfield code="a">Innere Sicherheit</subfield><subfield code="0">(DE-588)4127888-4</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="6" ind2=" "><subfield code="8">6\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="7" ind2="0"><subfield code="a">Soft Computing</subfield><subfield code="0">(DE-588)4455833-8</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="7" ind2=" "><subfield code="8">7\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Chau, Michael</subfield><subfield code="e">Sonstige</subfield><subfield code="0">(DE-588)138455058</subfield><subfield code="4">oth</subfield></datafield><datafield tag="711" ind1="2" ind2=" "><subfield code="a">PAISI</subfield><subfield code="d">2011</subfield><subfield code="c">Peking</subfield><subfield code="j">Sonstige</subfield><subfield code="0">(DE-588)16163608-1</subfield><subfield code="4">oth</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Lecture notes in computer science</subfield><subfield code="v">6749</subfield><subfield code="w">(DE-604)BV014880109</subfield><subfield code="9">6749</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1007/978-3-642-22039-5</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">1\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">2\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">3\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">4\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">5\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">6\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">7\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-2-LNC</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-2-SCS</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-024396384</subfield></datafield></record></collection> |
genre | (DE-588)1071861417 Konferenzschrift 2011 Peking gnd-content |
genre_facet | Konferenzschrift 2011 Peking |
id | DE-604.BV039544368 |
illustrated | Illustrated |
indexdate | 2025-01-10T15:14:03Z |
institution | BVB |
institution_GND | (DE-588)16163608-1 |
isbn | 9783642220388 9783642220395 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-024396384 |
oclc_num | 745501355 |
open_access_boolean | |
owner | DE-473 DE-BY-UBG DE-19 DE-BY-UBM DE-91 DE-BY-TUM DE-706 DE-739 DE-384 DE-M347 DE-20 DE-703 DE-355 DE-BY-UBR DE-92 DE-Aug4 DE-859 DE-634 |
owner_facet | DE-473 DE-BY-UBG DE-19 DE-BY-UBM DE-91 DE-BY-TUM DE-706 DE-739 DE-384 DE-M347 DE-20 DE-703 DE-355 DE-BY-UBR DE-92 DE-Aug4 DE-859 DE-634 |
physical | 1 Online-Ressource (X, 129 S.) graph. Darst., Kt. |
psigel | ZDB-2-LNC ZDB-2-SCS |
publishDate | 2011 |
publishDateSearch | 2011 |
publishDateSort | 2011 |
publisher | Springer |
record_format | marc |
series | Lecture notes in computer science |
series2 | Lecture notes in computer science |
spelling | Intelligence and security informatics Pacific Asia workshop, PAISI 2011, Beijing, China, July 9, 2011 ; proceedings Michael Chau ... (eds.) Berlin [u.a.] Springer 2011 1 Online-Ressource (X, 129 S.) graph. Darst., Kt. txt rdacontent c rdamedia cr rdacarrier Lecture notes in computer science 6749 Schutz (DE-588)4180271-8 gnd rswk-swf Objektverfolgung (DE-588)4311226-2 gnd rswk-swf Data Mining (DE-588)4428654-5 gnd rswk-swf Kryptoanalyse (DE-588)4830502-9 gnd rswk-swf Computersicherheit (DE-588)4274324-2 gnd rswk-swf Internetkriminalität (DE-588)7864395-8 gnd rswk-swf Kryptologie (DE-588)4033329-2 gnd rswk-swf Computerkriminalität (DE-588)4010452-7 gnd rswk-swf Maschinelles Sehen (DE-588)4129594-8 gnd rswk-swf Datensicherung (DE-588)4011144-1 gnd rswk-swf Authentifikation (DE-588)4330656-1 gnd rswk-swf Zugriffskontrolle (DE-588)4293034-0 gnd rswk-swf World Wide Web 2.0 (DE-588)7548364-6 gnd rswk-swf Privatsphäre (DE-588)4123980-5 gnd rswk-swf Internet (DE-588)4308416-3 gnd rswk-swf Innere Sicherheit (DE-588)4127888-4 gnd rswk-swf Social Media (DE-588)4639271-3 gnd rswk-swf Wissensextraktion (DE-588)4546354-2 gnd rswk-swf Kamera (DE-588)4366655-3 gnd rswk-swf Soziales Netzwerk (DE-588)4055762-5 gnd rswk-swf Kritische Informationsinfrastruktur (DE-588)7636254-1 gnd rswk-swf Soft Computing (DE-588)4455833-8 gnd rswk-swf Content Management (DE-588)4673954-3 gnd rswk-swf Automatische Identifikation (DE-588)4206098-9 gnd rswk-swf Bilderkennung (DE-588)4264283-8 gnd rswk-swf Computerforensik (DE-588)4774034-6 gnd rswk-swf Terrorismus (DE-588)4059534-1 gnd rswk-swf Text Mining (DE-588)4728093-1 gnd rswk-swf Paperback / softback Research Web usage mining crime ontology geospatial analysis modeling and simulation public health security (DE-588)1071861417 Konferenzschrift 2011 Peking gnd-content Internetkriminalität (DE-588)7864395-8 s Kryptoanalyse (DE-588)4830502-9 s Datensicherung (DE-588)4011144-1 s Computersicherheit (DE-588)4274324-2 s DE-604 Computerkriminalität (DE-588)4010452-7 s World Wide Web 2.0 (DE-588)7548364-6 s Data Mining (DE-588)4428654-5 s Text Mining (DE-588)4728093-1 s Kryptologie (DE-588)4033329-2 s 1\p DE-604 Internet (DE-588)4308416-3 s Soziales Netzwerk (DE-588)4055762-5 s Social Media (DE-588)4639271-3 s Wissensextraktion (DE-588)4546354-2 s 2\p DE-604 Computerforensik (DE-588)4774034-6 s 3\p DE-604 Kritische Informationsinfrastruktur (DE-588)7636254-1 s Schutz (DE-588)4180271-8 s Privatsphäre (DE-588)4123980-5 s Zugriffskontrolle (DE-588)4293034-0 s Authentifikation (DE-588)4330656-1 s 4\p DE-604 Maschinelles Sehen (DE-588)4129594-8 s Bilderkennung (DE-588)4264283-8 s Automatische Identifikation (DE-588)4206098-9 s Objektverfolgung (DE-588)4311226-2 s Kamera (DE-588)4366655-3 s 5\p DE-604 Terrorismus (DE-588)4059534-1 s Content Management (DE-588)4673954-3 s Innere Sicherheit (DE-588)4127888-4 s 6\p DE-604 Soft Computing (DE-588)4455833-8 s 7\p DE-604 Chau, Michael Sonstige (DE-588)138455058 oth PAISI 2011 Peking Sonstige (DE-588)16163608-1 oth Lecture notes in computer science 6749 (DE-604)BV014880109 6749 https://doi.org/10.1007/978-3-642-22039-5 Verlag Volltext 1\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk 2\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk 3\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk 4\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk 5\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk 6\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk 7\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk |
spellingShingle | Intelligence and security informatics Pacific Asia workshop, PAISI 2011, Beijing, China, July 9, 2011 ; proceedings Lecture notes in computer science Schutz (DE-588)4180271-8 gnd Objektverfolgung (DE-588)4311226-2 gnd Data Mining (DE-588)4428654-5 gnd Kryptoanalyse (DE-588)4830502-9 gnd Computersicherheit (DE-588)4274324-2 gnd Internetkriminalität (DE-588)7864395-8 gnd Kryptologie (DE-588)4033329-2 gnd Computerkriminalität (DE-588)4010452-7 gnd Maschinelles Sehen (DE-588)4129594-8 gnd Datensicherung (DE-588)4011144-1 gnd Authentifikation (DE-588)4330656-1 gnd Zugriffskontrolle (DE-588)4293034-0 gnd World Wide Web 2.0 (DE-588)7548364-6 gnd Privatsphäre (DE-588)4123980-5 gnd Internet (DE-588)4308416-3 gnd Innere Sicherheit (DE-588)4127888-4 gnd Social Media (DE-588)4639271-3 gnd Wissensextraktion (DE-588)4546354-2 gnd Kamera (DE-588)4366655-3 gnd Soziales Netzwerk (DE-588)4055762-5 gnd Kritische Informationsinfrastruktur (DE-588)7636254-1 gnd Soft Computing (DE-588)4455833-8 gnd Content Management (DE-588)4673954-3 gnd Automatische Identifikation (DE-588)4206098-9 gnd Bilderkennung (DE-588)4264283-8 gnd Computerforensik (DE-588)4774034-6 gnd Terrorismus (DE-588)4059534-1 gnd Text Mining (DE-588)4728093-1 gnd |
subject_GND | (DE-588)4180271-8 (DE-588)4311226-2 (DE-588)4428654-5 (DE-588)4830502-9 (DE-588)4274324-2 (DE-588)7864395-8 (DE-588)4033329-2 (DE-588)4010452-7 (DE-588)4129594-8 (DE-588)4011144-1 (DE-588)4330656-1 (DE-588)4293034-0 (DE-588)7548364-6 (DE-588)4123980-5 (DE-588)4308416-3 (DE-588)4127888-4 (DE-588)4639271-3 (DE-588)4546354-2 (DE-588)4366655-3 (DE-588)4055762-5 (DE-588)7636254-1 (DE-588)4455833-8 (DE-588)4673954-3 (DE-588)4206098-9 (DE-588)4264283-8 (DE-588)4774034-6 (DE-588)4059534-1 (DE-588)4728093-1 (DE-588)1071861417 |
title | Intelligence and security informatics Pacific Asia workshop, PAISI 2011, Beijing, China, July 9, 2011 ; proceedings |
title_auth | Intelligence and security informatics Pacific Asia workshop, PAISI 2011, Beijing, China, July 9, 2011 ; proceedings |
title_exact_search | Intelligence and security informatics Pacific Asia workshop, PAISI 2011, Beijing, China, July 9, 2011 ; proceedings |
title_full | Intelligence and security informatics Pacific Asia workshop, PAISI 2011, Beijing, China, July 9, 2011 ; proceedings Michael Chau ... (eds.) |
title_fullStr | Intelligence and security informatics Pacific Asia workshop, PAISI 2011, Beijing, China, July 9, 2011 ; proceedings Michael Chau ... (eds.) |
title_full_unstemmed | Intelligence and security informatics Pacific Asia workshop, PAISI 2011, Beijing, China, July 9, 2011 ; proceedings Michael Chau ... (eds.) |
title_short | Intelligence and security informatics |
title_sort | intelligence and security informatics pacific asia workshop paisi 2011 beijing china july 9 2011 proceedings |
title_sub | Pacific Asia workshop, PAISI 2011, Beijing, China, July 9, 2011 ; proceedings |
topic | Schutz (DE-588)4180271-8 gnd Objektverfolgung (DE-588)4311226-2 gnd Data Mining (DE-588)4428654-5 gnd Kryptoanalyse (DE-588)4830502-9 gnd Computersicherheit (DE-588)4274324-2 gnd Internetkriminalität (DE-588)7864395-8 gnd Kryptologie (DE-588)4033329-2 gnd Computerkriminalität (DE-588)4010452-7 gnd Maschinelles Sehen (DE-588)4129594-8 gnd Datensicherung (DE-588)4011144-1 gnd Authentifikation (DE-588)4330656-1 gnd Zugriffskontrolle (DE-588)4293034-0 gnd World Wide Web 2.0 (DE-588)7548364-6 gnd Privatsphäre (DE-588)4123980-5 gnd Internet (DE-588)4308416-3 gnd Innere Sicherheit (DE-588)4127888-4 gnd Social Media (DE-588)4639271-3 gnd Wissensextraktion (DE-588)4546354-2 gnd Kamera (DE-588)4366655-3 gnd Soziales Netzwerk (DE-588)4055762-5 gnd Kritische Informationsinfrastruktur (DE-588)7636254-1 gnd Soft Computing (DE-588)4455833-8 gnd Content Management (DE-588)4673954-3 gnd Automatische Identifikation (DE-588)4206098-9 gnd Bilderkennung (DE-588)4264283-8 gnd Computerforensik (DE-588)4774034-6 gnd Terrorismus (DE-588)4059534-1 gnd Text Mining (DE-588)4728093-1 gnd |
topic_facet | Schutz Objektverfolgung Data Mining Kryptoanalyse Computersicherheit Internetkriminalität Kryptologie Computerkriminalität Maschinelles Sehen Datensicherung Authentifikation Zugriffskontrolle World Wide Web 2.0 Privatsphäre Internet Innere Sicherheit Social Media Wissensextraktion Kamera Soziales Netzwerk Kritische Informationsinfrastruktur Soft Computing Content Management Automatische Identifikation Bilderkennung Computerforensik Terrorismus Text Mining Konferenzschrift 2011 Peking |
url | https://doi.org/10.1007/978-3-642-22039-5 |
volume_link | (DE-604)BV014880109 |
work_keys_str_mv | AT chaumichael intelligenceandsecurityinformaticspacificasiaworkshoppaisi2011beijingchinajuly92011proceedings AT paisipeking intelligenceandsecurityinformaticspacificasiaworkshoppaisi2011beijingchinajuly92011proceedings |